General

  • Target

    2196-14-0x0000000000400000-0x0000000000452000-memory.dmp

  • Size

    328KB

  • MD5

    6b94763b308745d0f0b0f5e7c7e04c6a

  • SHA1

    cdc80d23a3e3e3f9b6e13a48d0c9314af6b4daf0

  • SHA256

    6d6d004fe0a2370daf018a1b629e950187b6879a30b468ca3bafe55de1ff2cb7

  • SHA512

    ec83d95e26a3330e633a7576e231721f727455a903b7337b90fb6bc4d4a9736fe45e9a74d13c9d01604fb0555c980c5dbede919fae1e0015ba0bd3fb6ec3a8dd

  • SSDEEP

    3072:uq6EgY6iirUjWGIAwPsuU341B/TA1tA0ioYcZqf7D349eqiOLibBOm:VqY6iHwPCo1RTA7A0YcZqf7DIHL

Malware Config

Extracted

Family

redline

Botnet

TG CLOUD @RLREBORN Admin @FATHEROFCARDERS

C2

89.105.223.196:29862

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2196-14-0x0000000000400000-0x0000000000452000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections